Your Search

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 131 results

|

Items per page:

Sort By
  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • Security at the Speed of DevOps: Building In, Not Bolting On

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to de...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • "We Take Security Seriously"

    Tuesday15:30 - 16:1504 Jun 2019
    Insight Stage

    We take security seriously – it’s a ‘throwaway’ phrase commonly used by companies who have just been breached and are trying to rebuild confidence among their s...

    • Language: English

  • Trusted Access: Excuse Me Do I Know You?

    Tuesday15:30 - 16:3004 Jun 2019
    Information Security Exchange

    Trusted Access provides a zero-trust approach to securing all access across your applications and environment, from any user, device and location. It protects y...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • How to Secure Your Data in the Cloud

    Tuesday16:00 - 16:2504 Jun 2019
    Technology Showcase

    The cloud revolution is upon us. More and more organisations are moving their critical data to the cloud due to the tremendous potential of cloud platforms. But...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Scamming you at Infosec? Easy.

    Tuesday16:30 - 16:5504 Jun 2019
    Cyber Innovation Showcase

    You may know a thing or two about cybersecurity. However, modern hackers are sophisticated, risk-calculating, online marketing experts who take social engineeri...

    • Language: English

  • Death of the Password: Picture Authentication

    Tuesday16:40 - 17:0504 Jun 2019
    Technology Showcase

    Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.